US20130198351A1 - Flexible Caching in a Content Centric Network - Google Patents
Flexible Caching in a Content Centric Network Download PDFInfo
- Publication number
- US20130198351A1 US20130198351A1 US13/359,863 US201213359863A US2013198351A1 US 20130198351 A1 US20130198351 A1 US 20130198351A1 US 201213359863 A US201213359863 A US 201213359863A US 2013198351 A1 US2013198351 A1 US 2013198351A1
- Authority
- US
- United States
- Prior art keywords
- content object
- cache
- content
- additional parameter
- name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Definitions
- the present invention relates generally to content processing techniques, and more particularly to techniques for caching content in a content centric networks (CCN).
- CCN content centric networks
- CCNs content centric networks
- names are assigned to each content object, and the assigned name is used to request and return the content objects (rather than addresses).
- CCNs For a detailed description of CCNs, see, for example, V. Jacobson et al., “Networking Named Content,” ACM Int'l Conf. on emerging Networking Experiments and Technologies (CoNEXT), 1-12 (2009), incorporated by reference herein.
- content is routed through a CCN network based on the assigned name.
- CCN addresses the explosive growth of available content more flexibly and efficiently than current Internet approaches.
- CCN networks employ a cache, also referred to as a Content Store, at every CCN router in a network so that each content object will likely be served by a router closest to any end user. In this manner, a user can obtain a content object from the closest router that has the requested object.
- Caches often employ a cache replacement policy based on, for example, the recency and/or frequency of requests for the content object, such as a Least-Recently-Used (LRU) or a Least-Frequently-Used (LFU) cache replacement strategy.
- LRU Least-Recently-Used
- LFU Least-Frequently-Used
- a content object is selectively stored in a cache of a named-based network following a cache miss by storing a name of the content object in the cache following the cache miss; obtaining the content object from another node in the named-based network; and selectively storing the obtained content object in the cache.
- an additional parameter can optionally be stored with the name, wherein the additional parameter quantifies a predefined caching objective.
- An objective function can be evaluated based on the additional parameter and the selective storage of the obtained content object is based on an evaluation of the objective function.
- the predefined caching objective can be improved robustness to an attack and the additional parameter can comprise a number of requests for the content object.
- the predefined caching objective can be improved energy efficiency and the additional parameter can comprise a number of hops required to obtain the content object.
- FIG. 1 illustrates a conventional CCN router
- FIG. 2 illustrates the exemplary conventional cache of FIG. 1 in further detail
- FIG. 3 illustrates an exemplary CCN router incorporating flexible caching aspects of the present invention
- FIG. 4 illustrates the exemplary cache of FIG. 3 in further detail
- FIG. 5 illustrates an exemplary name record for the cache of FIG. 4 ;
- FIG. 6 is a flow chart describing an exemplary implementation of a next-hop content forwarding process that incorporates aspects of the present invention
- FIG. 7 is a flow chart describing an exemplary implementation of a next-hop content receiving process that incorporates aspects of the present invention.
- FIGS. 8A and 8B are flow charts describing alternative exemplary implementations of a decision function for the exemplary router of FIG. 3 .
- the present invention provides improved techniques for flexible caching in a Content Centric Network.
- content objects and content names are stored in a content store rather than separately in a content store and pending interest table, as with conventional CCN approaches.
- the content names are stored with additional information, such as Request Number and Hop Count, that can be employed by a Decision Function to address new objectives when determining whether or not to store a given content object in the cache, such as maintaining cache robustness in the face of a pollution attack or improving energy efficiency.
- FIG. 1 illustrates a conventional CCN router 100 .
- the router 100 comprises a cache 200 , discussed further below in conjunction with FIG. 2 .
- the router 100 employs a Pending Interest Table (PIT) 120 and a Forwarding Information Base (FIB) 140 .
- PIT Pending Interest Table
- FIB Forwarding Information Base
- the PIT 120 keeps track of pending requests (called “interests”) for content objects that cannot be located at a given router.
- the FIB 140 is similar to an IP forwarding table except that lookup is based on content names rather than IP addresses.
- requests 110 from a user 105 are propagated through a network 150 toward an origin content server 180 .
- Any router such as the router 100 , that has the requested content will trigger a “hit,” terminate the request and reply with the content, as indicated by a vertical “hit arrow” 125 in FIG. 1 . Otherwise, a “miss” is indicated, and the router 100 will forward the request 110 to the next hop in the network 150 towards the origin content server 180 .
- a cache 200 plays an important role in improving network efficiency and enhancing the experience of the user 105 .
- the router 100 having the content that is closest to the user 105 along the path to the origin content server 180 will terminate the request 110 and deliver the content in a response 190 .
- FIG. 2 illustrates the exemplary conventional cache 200 of FIG. 1 in further detail.
- the exemplary conventional cache 200 employs a LRU cache replacement policy.
- the exemplary conventional cache 200 places the most recently requested/used content (Content 1) at the top of the cache 200 .
- the second most recently requested content (Content 2) is placed in the second position, just below the top of the cache 200 .
- a new request 110 results in a hit at some position in a cache 200
- the corresponding content will be moved to the top and other contents above it will be moved down by one position.
- the content will be fetched remotely and placed at the top of the cache 200 .
- Other content in the cache 200 will be moved down by one position, in a known manner. If storing a new content object results in an overflow of the cache 200 , the content object(s) at the bottom of the cache 200 (i.e., the objects that are least recently used) will be evicted from the cache 200 to make room for the new content.
- FIG. 3 illustrates an exemplary CCN router 300 incorporating flexible caching aspects of the present invention.
- the router 300 comprises a cache 400 , discussed further below in conjunction with FIG. 4 .
- the router 300 employs a Forwarding Information Base (FIB) 140 , in a similar manner to FIG. 1 .
- the exemplary CCN router 300 does not include a PIT 120 . Rather, the content names are moved to the cache 400 .
- the cache 400 also comprises content name records 500 .
- the cache 400 comprises content objects as well as content names (both subject to the same replacement policy).
- the name records 500 optionally contain additional fields that are utilized by a new Decision Function (DF) 800 , discussed further below in conjunction with FIG. 8 , to achieve an objective that can be configured by an operator (for example, “mitigate attack type x”, “enable energy efficiency”, etc.).
- DF Decision Function
- Each of the objectives may use a different set of fields to control caching of objects.
- requests 310 from a user 305 are propagated through a network 150 toward an origin content server 180 .
- Any router, such as the router 300 that has the requested content will trigger a “hit,” terminate the request 310 and reply with the content, as indicated by a vertical “hit arrow” 125 in FIG. 3 .
- the router 300 in FIG. 3 operates in a similar manner to the router 100 of FIG. 1 .
- the Decision Function (DF) 800 will determine whether or not to cache the content object when it is returned. If the object is not already cached, the corresponding name, if not yet present, will be added to the cache 400 instead.
- the DF 800 can utilize additional stored information to better control caching. For example, to protect against pollution attack as described below, the DF 800 can rely on the number of requests that have been made for a given object that is not cached.
- the DF 800 decides not to cache the content object, the number of requests attempted are recorded in the cache 400 along with the content name. This number of requests can be used for future decisions by the DF 800 .
- the DF 800 decides to cache the content object, then the content name, if present, is removed and the new content object is placed at the top (a content object actually has a content name in its header).
- content object C needs to be evicted to make room for a new content object, all content names below C will also be evicted.
- FIG. 4 illustrates the exemplary cache 400 of FIG. 3 in further detail.
- the exemplary conventional cache 400 employs a LRU cache replacement policy.
- the exemplary cache 400 stores either the content object itself, or the corresponding name of the content object, based on the decision function 800 .
- the exemplary cache 400 places the most recently requested/used content (Content 1) at the top of the cache 400 .
- the name of the second most recently requested content (ContentName 2) is placed in the second position, just below the top of the cache 400 .
- the corresponding content will be moved to the top and other contents above it will be moved down by one position.
- the content or corresponding content name When a new request 110 results is a miss, the content or corresponding content name will be fetched remotely and placed at the top of the cache 400 . Other content in the cache 400 will be moved down by one position, in a known manner. If storing a new content object results in an overflow of the cache 400 , the content object(s) at the bottom of the cache 400 (i.e., the objects or names that are least recently used) will be evicted from the cache 400 to make room for the new content.
- FIG. 5 illustrates an exemplary name record 500 .
- Each name record 500 comprises the name of a corresponding content object in record 510 .
- the exemplary name record 500 optionally also comprises a record 520 indicating a number of requests for the object, and a record 530 indicating the number of hops to the content object or any other fields that can help the DF make a decision.
- a content name can be considered a reservation placeholder for the content.
- the information cached for a content name and a content object are different. A content name is thus significantly shorter than the content object itself. Thus, the additional space required by content names is typically negligible compared to that required by content objects.
- content names stored in a cache 400 can also contain additional information that can be manipulated by the DF 800 to make a better decision to cache or not to cache a given content object.
- the DF 800 may rely on the number of hops to an origin content server 180 and other relevant parameters. In this manner, content objects that are far away from an origin server 180 can be preferred since a miss will likely result in consuming energy on more routers 300 . Thus, the method may prefer to cache a content object that has a higher hop count.
- the disclosed router 300 allows for other fields to be added and the DF 800 to be programmable to incorporate new objectives.
- FIG. 6 is a flow chart describing an exemplary implementation of a next-hop content forwarding process 600 .
- the content object is directly returned by the router during step 615 if it is determined during step 610 that the object C is in the cache 300 . If, however, it is determined during step 610 that the content object C is not in the cache 300 , but it is determined during step 620 that the content name of content object C is in the cache 300 , then the entry is adjusted during step 625 , if needed. For example, this may include recording a new interface number.
- step 620 if it is determined during step 620 that the content name is also not in the cache (i.e., a cache miss), the content name is stored during step 630 and the request is forwarded to the next-hop router 300 which may eventually reach the origin content server 180 if none of the routers along the path has the requested object.
- FIG. 7 is a flow chart describing an exemplary implementation of a next-hop content receiving process 700 .
- the router 300 checks the cache during step 710 . If it is determined during step 710 that the cache 400 already has the content object because it has received the same copy previously from another router, the process 700 simply discards the object during step 715 . Otherwise, if it is determined during step 720 that the router 300 does not find a matching content name, the process 700 discards the content object during step 725 . This situation may arise because the content name has timed-out (e.g., been evicted by the replacement algorithm).
- the DF 800 makes a decision during step 730 about whether or not to cache the content object C. If the DF 800 decides to cache the object, the DF 800 stores the content object, removes the content name and returns the content object C to the user during step 735 . Otherwise, the DF 800 updates the content name and returns the content object C to the user during step 740 .
- FIGS. 8A and 8B are flow charts describing alternative exemplary implementations of a decision function 800 and 800 ′, respectively (and collectively referred to as decision functions 800 ).
- the decision functions 800 determine whether a given router should store a given content object in the cache, based on one or more different methods for different objectives.
- FIG. 8A illustrates a decision function 800 based on defending against pollution attacks.
- FIG. 8B illustrates a decision function 800 based on energy-efficient caching.
- the exemplary decision function 800 assigns a request number for content C to a variable t during step 810 .
- decision function 800 evaluates an objective function, ⁇ 1 , as follows:
- t denotes the t-th request of a given content object and is recorded in the Request# field of the name record 500
- p and q are parameters of the function.
- the content object is stored in the cache 400 during step 820 for possible future use.
- other objects in the cache 400 may be evicted, if needed, to make room for C and C is returned.
- the content object is not stored in the cache 400 during step 830 .
- the content name for C is stored in the cache 400 using a name record 500 and object C is returned.
- the exemplary decision function 800 ′ assigns a number of hops to the origin server 180 for the content C to a variable d c during step 850 .
- decision function 800 evaluates an objective function, ⁇ 2 , as follows:
- d c is the number of hops toward the origin server 180 hosting content C and is recorded in the Hops field of the exemplary name record 500
- D is the network diameter
- w is a weighting parameter
- the content object is stored in the cache during step 870 for possible future use.
- other objects in the cache 400 may be evicted, if needed, to make room for C and C is returned.
- the content object is not stored in the cache 400 during step 880 .
- the content name for C is stored in the cache 400 using a name record 500 and object C is returned.
- processor as used herein is intended to include any processing device, such as, for example, one that includes a CPU (central processing unit) and/or other forms of processing circuitry. Further, the term “processor” may refer to more than one individual processor.
- memory is intended to include memory associated with a processor or CPU, such as, for example, RAM (random access memory), ROM (read only memory), a fixed memory device (for example, hard drive), a removable memory device (for example, diskette), a flash memory and the like.
- computer software including instructions or code for performing the methodologies of the invention, as described herein, may be stored in one or more associated memory devices and, when ready to be utilized, loaded in part or in whole and implemented by a CPU or other processing circuitry.
- the memory elements can include local memory employed during actual implementation of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during implementation.
- the disclosed CCN routers provide a number of advantages relative to conventional arrangements. As indicated above, the disclosed techniques allow a router to determine whether a given content object should be stored in a cache, based on one or more objectives. Among other benefits the disclosed caching system allows for incremental deployment and does not require interoperability among different routers.
- the functions of the present invention can be embodied in the form of methods and apparatuses for practicing those methods.
- One or more aspects of the present invention can be embodied in the form of program code, for example, whether stored in a storage medium, loaded into and/or executed by a machine, or transmitted over some transmission medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention.
- the program code segments combine with the processor to provide a device that operates analogously to specific logic circuits.
- the invention can also be implemented in one or more of an integrated circuit, a digital signal processor, a microprocessor, and a micro-controller.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- The present invention relates generally to content processing techniques, and more particularly to techniques for caching content in a content centric networks (CCN).
- In content centric networks (CCNs), names are assigned to each content object, and the assigned name is used to request and return the content objects (rather than addresses). For a detailed description of CCNs, see, for example, V. Jacobson et al., “Networking Named Content,” ACM Int'l Conf. on emerging Networking Experiments and Technologies (CoNEXT), 1-12 (2009), incorporated by reference herein. Generally, content is routed through a CCN network based on the assigned name. CCN addresses the explosive growth of available content more flexibly and efficiently than current Internet approaches. CCN networks employ a cache, also referred to as a Content Store, at every CCN router in a network so that each content object will likely be served by a router closest to any end user. In this manner, a user can obtain a content object from the closest router that has the requested object.
- Caches often employ a cache replacement policy based on, for example, the recency and/or frequency of requests for the content object, such as a Least-Recently-Used (LRU) or a Least-Frequently-Used (LFU) cache replacement strategy. These solutions, however, are not sufficient when attackers request objects in a manner that deviates from those normally requested by legitimate users. For example, a cache pollution attack can adversely impact CCN networks. In a cache pollution attack, the attackers request content objects from content servers uniformly, which has the impact of maximally destroying content locality in a cache. Typically, performance is degraded by requesting unpopular content objects, to thereby displace more popular content objects from the caches. Detection of such attacks presents additional challenges in a CCN network, since addresses may not be available to identify the attackers.
- A need exists for improved caching systems for CCN networks that maintain cache robustness in the face of such attacks. A further need exists for improved caching systems that determine whether to store a given content item in the cache based on one or more objectives, such as improved energy consumption by caching content objects in CCN routers further away from the corresponding origin content servers than those located near the servers.
- Generally, flexible caching techniques are provided for a content centric network. According to one aspect of the invention, a content object is selectively stored in a cache of a named-based network following a cache miss by storing a name of the content object in the cache following the cache miss; obtaining the content object from another node in the named-based network; and selectively storing the obtained content object in the cache.
- According to a further aspect of the invention, an additional parameter can optionally be stored with the name, wherein the additional parameter quantifies a predefined caching objective. An objective function can be evaluated based on the additional parameter and the selective storage of the obtained content object is based on an evaluation of the objective function.
- For example, the predefined caching objective can be improved robustness to an attack and the additional parameter can comprise a number of requests for the content object. In a further variation, the predefined caching objective can be improved energy efficiency and the additional parameter can comprise a number of hops required to obtain the content object.
- A more complete understanding of the present invention, as well as further features and advantages of the present invention, will be obtained by reference to the following detailed description and drawings.
-
FIG. 1 illustrates a conventional CCN router; -
FIG. 2 illustrates the exemplary conventional cache ofFIG. 1 in further detail; -
FIG. 3 illustrates an exemplary CCN router incorporating flexible caching aspects of the present invention; -
FIG. 4 illustrates the exemplary cache ofFIG. 3 in further detail; -
FIG. 5 illustrates an exemplary name record for the cache ofFIG. 4 ; -
FIG. 6 is a flow chart describing an exemplary implementation of a next-hop content forwarding process that incorporates aspects of the present invention; -
FIG. 7 is a flow chart describing an exemplary implementation of a next-hop content receiving process that incorporates aspects of the present invention; and -
FIGS. 8A and 8B are flow charts describing alternative exemplary implementations of a decision function for the exemplary router ofFIG. 3 . - The present invention provides improved techniques for flexible caching in a Content Centric Network. According to one aspect of the invention, content objects and content names are stored in a content store rather than separately in a content store and pending interest table, as with conventional CCN approaches. According to a further aspect of the invention, the content names are stored with additional information, such as Request Number and Hop Count, that can be employed by a Decision Function to address new objectives when determining whether or not to store a given content object in the cache, such as maintaining cache robustness in the face of a pollution attack or improving energy efficiency.
- While the present invention is illustrated herein in the context of exemplary CCN networks, the present invention can be implemented in other named-based caching networks, as would be apparent to a person of ordinary skill in the art.
-
FIG. 1 illustrates aconventional CCN router 100. Therouter 100 comprises acache 200, discussed further below in conjunction withFIG. 2 . In addition, therouter 100 employs a Pending Interest Table (PIT) 120 and a Forwarding Information Base (FIB) 140. The PIT 120 keeps track of pending requests (called “interests”) for content objects that cannot be located at a given router. The FIB 140 is similar to an IP forwarding table except that lookup is based on content names rather than IP addresses. - As shown in
FIG. 1 ,requests 110 from auser 105 are propagated through anetwork 150 toward anorigin content server 180. Any router, such as therouter 100, that has the requested content will trigger a “hit,” terminate the request and reply with the content, as indicated by a vertical “hit arrow” 125 inFIG. 1 . Otherwise, a “miss” is indicated, and therouter 100 will forward therequest 110 to the next hop in thenetwork 150 towards theorigin content server 180. In eachrouter 100, acache 200 plays an important role in improving network efficiency and enhancing the experience of theuser 105. When there is arequest 110, therouter 100 having the content that is closest to theuser 105 along the path to theorigin content server 180 will terminate therequest 110 and deliver the content in aresponse 190. -
FIG. 2 illustrates the exemplaryconventional cache 200 ofFIG. 1 in further detail. For ease of illustration, assume that the exemplaryconventional cache 200 employs a LRU cache replacement policy. As shown inFIG. 2 , the exemplaryconventional cache 200 places the most recently requested/used content (Content 1) at the top of thecache 200. The second most recently requested content (Content 2) is placed in the second position, just below the top of thecache 200. When anew request 110 results in a hit at some position in acache 200, the corresponding content will be moved to the top and other contents above it will be moved down by one position. When anew request 110 results is a miss, the content will be fetched remotely and placed at the top of thecache 200. Other content in thecache 200 will be moved down by one position, in a known manner. If storing a new content object results in an overflow of thecache 200, the content object(s) at the bottom of the cache 200 (i.e., the objects that are least recently used) will be evicted from thecache 200 to make room for the new content. -
FIG. 3 illustrates anexemplary CCN router 300 incorporating flexible caching aspects of the present invention. Therouter 300 comprises acache 400, discussed further below in conjunction withFIG. 4 . In addition, therouter 300 employs a Forwarding Information Base (FIB) 140, in a similar manner toFIG. 1 . Theexemplary CCN router 300 does not include a PIT 120. Rather, the content names are moved to thecache 400. - As discussed further below in conjunction with
FIGS. 4 and 5 , thecache 400 also comprisescontent name records 500. Thus, thecache 400 comprises content objects as well as content names (both subject to the same replacement policy). The name records 500 optionally contain additional fields that are utilized by a new Decision Function (DF) 800, discussed further below in conjunction withFIG. 8 , to achieve an objective that can be configured by an operator (for example, “mitigate attack type x”, “enable energy efficiency”, etc.). Each of the objectives may use a different set of fields to control caching of objects. - As shown in
FIG. 3 ,requests 310 from auser 305 are propagated through anetwork 150 toward anorigin content server 180. Any router, such as therouter 300, that has the requested content will trigger a “hit,” terminate therequest 310 and reply with the content, as indicated by a vertical “hit arrow” 125 inFIG. 3 . In this case, therouter 300 inFIG. 3 operates in a similar manner to therouter 100 ofFIG. 1 . - Otherwise, when there is a miss and the content object needs to be fetched remotely, the Decision Function (DF) 800 will determine whether or not to cache the content object when it is returned. If the object is not already cached, the corresponding name, if not yet present, will be added to the
cache 400 instead. TheDF 800 can utilize additional stored information to better control caching. For example, to protect against pollution attack as described below, theDF 800 can rely on the number of requests that have been made for a given object that is not cached. - Thus, when a
request 310 finds a matching content name but theDF 800 decides not to cache the content object, the number of requests attempted are recorded in thecache 400 along with the content name. This number of requests can be used for future decisions by theDF 800. On the other hand, if theDF 800 decides to cache the content object, then the content name, if present, is removed and the new content object is placed at the top (a content object actually has a content name in its header). When content object C needs to be evicted to make room for a new content object, all content names below C will also be evicted. -
FIG. 4 illustrates theexemplary cache 400 ofFIG. 3 in further detail. For ease of illustration, assume that the exemplaryconventional cache 400 employs a LRU cache replacement policy. Generally, for a given content object, theexemplary cache 400 stores either the content object itself, or the corresponding name of the content object, based on thedecision function 800. As shown inFIG. 4 , theexemplary cache 400 places the most recently requested/used content (Content 1) at the top of thecache 400. The name of the second most recently requested content (ContentName 2) is placed in the second position, just below the top of thecache 400. When anew request 110 results in a hit at some position in acache 400, the corresponding content will be moved to the top and other contents above it will be moved down by one position. When anew request 110 results is a miss, the content or corresponding content name will be fetched remotely and placed at the top of thecache 400. Other content in thecache 400 will be moved down by one position, in a known manner. If storing a new content object results in an overflow of thecache 400, the content object(s) at the bottom of the cache 400 (i.e., the objects or names that are least recently used) will be evicted from thecache 400 to make room for the new content. - As shown in
FIG. 4 , content names are stored in name records 500 for the objects associated with the second and third positions.FIG. 5 illustrates anexemplary name record 500. Eachname record 500 comprises the name of a corresponding content object inrecord 510. In addition, theexemplary name record 500 optionally also comprises arecord 520 indicating a number of requests for the object, and arecord 530 indicating the number of hops to the content object or any other fields that can help the DF make a decision. Thus, a content name can be considered a reservation placeholder for the content. The information cached for a content name and a content object are different. A content name is thus significantly shorter than the content object itself. Thus, the additional space required by content names is typically negligible compared to that required by content objects. - As indicated above, content names stored in a
cache 400 can also contain additional information that can be manipulated by theDF 800 to make a better decision to cache or not to cache a given content object. For example, for an energy-efficiency objective, theDF 800 may rely on the number of hops to anorigin content server 180 and other relevant parameters. In this manner, content objects that are far away from anorigin server 180 can be preferred since a miss will likely result in consuming energy onmore routers 300. Thus, the method may prefer to cache a content object that has a higher hop count. The disclosedrouter 300 allows for other fields to be added and theDF 800 to be programmable to incorporate new objectives. -
FIG. 6 is a flow chart describing an exemplary implementation of a next-hopcontent forwarding process 600. When a request for content object C arrives at a router, the content object is directly returned by the router duringstep 615 if it is determined duringstep 610 that the object C is in thecache 300. If, however, it is determined duringstep 610 that the content object C is not in thecache 300, but it is determined duringstep 620 that the content name of content object C is in thecache 300, then the entry is adjusted duringstep 625, if needed. For example, this may include recording a new interface number. Otherwise, if it is determined duringstep 620 that the content name is also not in the cache (i.e., a cache miss), the content name is stored duringstep 630 and the request is forwarded to the next-hop router 300 which may eventually reach theorigin content server 180 if none of the routers along the path has the requested object. -
FIG. 7 is a flow chart describing an exemplary implementation of a next-hopcontent receiving process 700. As shown inFIG. 7 , when arouter 300 receives a requested content object from its next-hop router or a server, therouter 300 checks the cache duringstep 710. If it is determined duringstep 710 that thecache 400 already has the content object because it has received the same copy previously from another router, theprocess 700 simply discards the object duringstep 715. Otherwise, if it is determined duringstep 720 that therouter 300 does not find a matching content name, theprocess 700 discards the content object duringstep 725. This situation may arise because the content name has timed-out (e.g., been evicted by the replacement algorithm). - If it is determined during
step 720 that the content name is found in the cache, then theDF 800 makes a decision duringstep 730 about whether or not to cache the content object C. If theDF 800 decides to cache the object, theDF 800 stores the content object, removes the content name and returns the content object C to the user duringstep 735. Otherwise, theDF 800 updates the content name and returns the content object C to the user duringstep 740. -
FIGS. 8A and 8B are flow charts describing alternative exemplary implementations of adecision function FIG. 8A illustrates adecision function 800 based on defending against pollution attacks.FIG. 8B illustrates adecision function 800 based on energy-efficient caching. - As shown in
FIG. 8A , theexemplary decision function 800 assigns a request number for content C to a variable t duringstep 810. Duringstep 815,decision function 800 evaluates an objective function, ψ1, as follows: -
- where t denotes the t-th request of a given content object and is recorded in the Request# field of the
name record 500, and p and q are parameters of the function. - With probability ψ1, the content object is stored in the
cache 400 duringstep 820 for possible future use. In addition, other objects in thecache 400 may be evicted, if needed, to make room for C and C is returned. - With probability (1−ψ1) the content object is not stored in the
cache 400 duringstep 830. In addition, the content name for C is stored in thecache 400 using aname record 500 and object C is returned. - As shown in
FIG. 8B , theexemplary decision function 800′ assigns a number of hops to theorigin server 180 for the content C to a variable dc duringstep 850. Duringstep 860,decision function 800 evaluates an objective function, ψ2, as follows: -
- where dc is the number of hops toward the
origin server 180 hosting content C and is recorded in the Hops field of theexemplary name record 500, D is the network diameter and w is a weighting parameter. - With probability ψ2 , the content object is stored in the cache during
step 870 for possible future use. In addition, other objects in thecache 400 may be evicted, if needed, to make room for C and C is returned. - With probability (1−ψ2), the content object is not stored in the
cache 400 duringstep 880. In addition, the content name for C is stored in thecache 400 using aname record 500 and object C is returned. - Other methods with different objectives generally can be incorporated into the
decision function 800 and may use different information fields in the name records 500, as would be apparent to a person of ordinary skill in the art. For example, popularity information may optionally be included in the name records 500. - The term “processor” as used herein is intended to include any processing device, such as, for example, one that includes a CPU (central processing unit) and/or other forms of processing circuitry. Further, the term “processor” may refer to more than one individual processor. The term “memory” is intended to include memory associated with a processor or CPU, such as, for example, RAM (random access memory), ROM (read only memory), a fixed memory device (for example, hard drive), a removable memory device (for example, diskette), a flash memory and the like.
- Accordingly, computer software including instructions or code for performing the methodologies of the invention, as described herein, may be stored in one or more associated memory devices and, when ready to be utilized, loaded in part or in whole and implemented by a CPU or other processing circuitry. The memory elements can include local memory employed during actual implementation of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during implementation.
- As previously indicated, the disclosed CCN routers, as described herein, provide a number of advantages relative to conventional arrangements. As indicated above, the disclosed techniques allow a router to determine whether a given content object should be stored in a cache, based on one or more objectives. Among other benefits the disclosed caching system allows for incremental deployment and does not require interoperability among different routers.
- It is emphasized that the above-described embodiments of the invention are intended to be illustrative only. In general, the exemplary CCN routers can be modified, as would be apparent to a person of ordinary skill in the art, to incorporate alternative decision functions based on different objectives. In addition, the disclosed techniques for flexible caching can be employed in any named-based caching networks, as would be apparent to a person of ordinary skill in the art.
- While exemplary embodiments of the present invention have been described with respect to digital logic blocks, as would be apparent to one skilled in the art, various functions may be implemented in the digital domain as processing steps in a software program, in hardware by circuit elements or state machines, or in combination of both software and hardware. Such software may be employed in, for example, a digital signal processor, application specific integrated circuit, micro-controller, or general-purpose computer. Such hardware and software may be embodied within circuits implemented within an integrated circuit.
- Thus, the functions of the present invention can be embodied in the form of methods and apparatuses for practicing those methods. One or more aspects of the present invention can be embodied in the form of program code, for example, whether stored in a storage medium, loaded into and/or executed by a machine, or transmitted over some transmission medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention. When implemented on a general-purpose processor, the program code segments combine with the processor to provide a device that operates analogously to specific logic circuits. The invention can also be implemented in one or more of an integrated circuit, a digital signal processor, a microprocessor, and a micro-controller.
- It is to be understood that the embodiments and variations shown and described herein are merely illustrative of the principles of this invention and that various modifications may be implemented by those skilled in the art without departing from the scope and spirit of the invention.
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/359,863 US20130198351A1 (en) | 2012-01-27 | 2012-01-27 | Flexible Caching in a Content Centric Network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/359,863 US20130198351A1 (en) | 2012-01-27 | 2012-01-27 | Flexible Caching in a Content Centric Network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130198351A1 true US20130198351A1 (en) | 2013-08-01 |
Family
ID=48871285
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/359,863 Abandoned US20130198351A1 (en) | 2012-01-27 | 2012-01-27 | Flexible Caching in a Content Centric Network |
Country Status (1)
Country | Link |
---|---|
US (1) | US20130198351A1 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130282860A1 (en) * | 2012-04-20 | 2013-10-24 | Futurewei Technologies, Inc. | Name-Based Neighbor Discovery and Multi-Hop Service Discovery in Information-Centric Networks |
US20130282854A1 (en) * | 2012-04-18 | 2013-10-24 | Samsung Electronics Co., Ltd. | Node and method for generating shortened name robust against change in hierarchical name in content-centric network (ccn) |
US20140126370A1 (en) * | 2012-11-08 | 2014-05-08 | Futurewei Technologies, Inc. | Method of Traffic Engineering for Provisioning Routing and Storage in Content-Oriented Networks |
US20140164552A1 (en) * | 2012-12-07 | 2014-06-12 | Ajou University Industry-Academic Cooperation Foundation | Method of caching contents by node and method of transmitting contents by contents provider in a content centric network |
US20150043592A1 (en) * | 2013-08-08 | 2015-02-12 | Samsung Electronics Co., Ltd | Terminal apparatus and method of controlling terminal apparatus |
EP3032805A1 (en) * | 2014-12-12 | 2016-06-15 | Tata Consultancy Services Limited | Method and system for optimal caching of content in an information centric networks (icn) |
WO2016201411A1 (en) * | 2015-06-12 | 2016-12-15 | Idac Holdings, Inc. | Reducing the http server load in an http-over-icn scenario |
US20170034240A1 (en) * | 2015-07-27 | 2017-02-02 | Palo Alto Research Center Incorporated | Content negotiation in a content centric network |
WO2017077363A1 (en) * | 2015-11-03 | 2017-05-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Selective caching for information-centric network based content delivery |
CN107896217A (en) * | 2017-11-28 | 2018-04-10 | 重庆邮电大学 | The caching pollution attack detection method of multi-parameter in content center network |
EP2942926B1 (en) * | 2014-05-01 | 2019-04-03 | Cisco Technology, Inc. | Accountable content stores for information centric networks |
US10270876B2 (en) | 2014-06-02 | 2019-04-23 | Verizon Digital Media Services Inc. | Probability based caching and eviction |
US10523777B2 (en) | 2013-09-30 | 2019-12-31 | Northeastern University | System and method for joint dynamic forwarding and caching in content distribution networks |
US11677625B2 (en) | 2019-07-02 | 2023-06-13 | Northeastern University | Network and method for servicing a computation request |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040054860A1 (en) * | 2002-09-17 | 2004-03-18 | Nokia Corporation | Selective cache admission |
US20080005163A1 (en) * | 2006-06-30 | 2008-01-03 | International Business Machines Corporation | Method and Apparatus For Caching Broadcasting Information |
US20080008089A1 (en) * | 2001-03-01 | 2008-01-10 | Akamai Technologies, Inc. | Optimal route selection in a content delivery network |
US20100146553A1 (en) * | 2008-12-05 | 2010-06-10 | Qualcomm Incorporated | Enhanced method and apparatus for enhancing support for service delivery |
US20120155348A1 (en) * | 2010-12-16 | 2012-06-21 | Palo Alto Research Center Incorporated | Energy-efficient content retrieval in content-centric networks |
US20120185937A1 (en) * | 2011-01-14 | 2012-07-19 | F5 Networks, Inc. | System and method for selectively storing web objects in a cache memory based on policy decisions |
US20130013587A1 (en) * | 2011-07-08 | 2013-01-10 | Microsoft Corporation | Incremental computing for web search |
US20130036433A1 (en) * | 2000-10-11 | 2013-02-07 | United Video Properties, Inc. | Systems and methods for caching data in media-on-demand systems |
US20130185508A1 (en) * | 2012-01-12 | 2013-07-18 | Fusion-Io, Inc. | Systems and methods for managing cache admission |
-
2012
- 2012-01-27 US US13/359,863 patent/US20130198351A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130036433A1 (en) * | 2000-10-11 | 2013-02-07 | United Video Properties, Inc. | Systems and methods for caching data in media-on-demand systems |
US20080008089A1 (en) * | 2001-03-01 | 2008-01-10 | Akamai Technologies, Inc. | Optimal route selection in a content delivery network |
US20040054860A1 (en) * | 2002-09-17 | 2004-03-18 | Nokia Corporation | Selective cache admission |
US20080005163A1 (en) * | 2006-06-30 | 2008-01-03 | International Business Machines Corporation | Method and Apparatus For Caching Broadcasting Information |
US20100146553A1 (en) * | 2008-12-05 | 2010-06-10 | Qualcomm Incorporated | Enhanced method and apparatus for enhancing support for service delivery |
US20120155348A1 (en) * | 2010-12-16 | 2012-06-21 | Palo Alto Research Center Incorporated | Energy-efficient content retrieval in content-centric networks |
US20120185937A1 (en) * | 2011-01-14 | 2012-07-19 | F5 Networks, Inc. | System and method for selectively storing web objects in a cache memory based on policy decisions |
US20130013587A1 (en) * | 2011-07-08 | 2013-01-10 | Microsoft Corporation | Incremental computing for web search |
US20130185508A1 (en) * | 2012-01-12 | 2013-07-18 | Fusion-Io, Inc. | Systems and methods for managing cache admission |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9237190B2 (en) * | 2012-04-18 | 2016-01-12 | Samsung Electronics Co., Ltd. | Node and method for generating shortened name robust against change in hierarchical name in content-centric network (CCN) |
US20130282854A1 (en) * | 2012-04-18 | 2013-10-24 | Samsung Electronics Co., Ltd. | Node and method for generating shortened name robust against change in hierarchical name in content-centric network (ccn) |
US9515920B2 (en) * | 2012-04-20 | 2016-12-06 | Futurewei Technologies, Inc. | Name-based neighbor discovery and multi-hop service discovery in information-centric networks |
US20130282860A1 (en) * | 2012-04-20 | 2013-10-24 | Futurewei Technologies, Inc. | Name-Based Neighbor Discovery and Multi-Hop Service Discovery in Information-Centric Networks |
US20140126370A1 (en) * | 2012-11-08 | 2014-05-08 | Futurewei Technologies, Inc. | Method of Traffic Engineering for Provisioning Routing and Storage in Content-Oriented Networks |
US9401868B2 (en) * | 2012-11-08 | 2016-07-26 | Futurewei Technologies, Inc. | Method of traffic engineering for provisioning routing and storage in content-oriented networks |
US20140164552A1 (en) * | 2012-12-07 | 2014-06-12 | Ajou University Industry-Academic Cooperation Foundation | Method of caching contents by node and method of transmitting contents by contents provider in a content centric network |
US9936038B2 (en) * | 2012-12-07 | 2018-04-03 | Samsung Electronics Co., Ltd. | Method of caching contents by node and method of transmitting contents by contents provider in a content centric network |
US20150043592A1 (en) * | 2013-08-08 | 2015-02-12 | Samsung Electronics Co., Ltd | Terminal apparatus and method of controlling terminal apparatus |
US9553790B2 (en) * | 2013-08-08 | 2017-01-24 | Samsung Electronics Co., Ltd. | Terminal apparatus and method of controlling terminal apparatus |
US10523777B2 (en) | 2013-09-30 | 2019-12-31 | Northeastern University | System and method for joint dynamic forwarding and caching in content distribution networks |
EP2942926B1 (en) * | 2014-05-01 | 2019-04-03 | Cisco Technology, Inc. | Accountable content stores for information centric networks |
US10609173B2 (en) | 2014-06-02 | 2020-03-31 | Verizon Digital Media Services Inc. | Probability based caching and eviction |
US10270876B2 (en) | 2014-06-02 | 2019-04-23 | Verizon Digital Media Services Inc. | Probability based caching and eviction |
EP3032805A1 (en) * | 2014-12-12 | 2016-06-15 | Tata Consultancy Services Limited | Method and system for optimal caching of content in an information centric networks (icn) |
US9860318B2 (en) * | 2014-12-12 | 2018-01-02 | Tata Consultancy Services Limited | Method and system for optimal caching of content in an information centric networks (ICN) |
US20160173604A1 (en) * | 2014-12-12 | 2016-06-16 | Tata Consultancy Services Limited | Method and system for optimal caching of content in an information centric networks (icn) |
WO2016201411A1 (en) * | 2015-06-12 | 2016-12-15 | Idac Holdings, Inc. | Reducing the http server load in an http-over-icn scenario |
US20170034240A1 (en) * | 2015-07-27 | 2017-02-02 | Palo Alto Research Center Incorporated | Content negotiation in a content centric network |
US10701038B2 (en) * | 2015-07-27 | 2020-06-30 | Cisco Technology, Inc. | Content negotiation in a content centric network |
WO2017077363A1 (en) * | 2015-11-03 | 2017-05-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Selective caching for information-centric network based content delivery |
CN107896217A (en) * | 2017-11-28 | 2018-04-10 | 重庆邮电大学 | The caching pollution attack detection method of multi-parameter in content center network |
US11677625B2 (en) | 2019-07-02 | 2023-06-13 | Northeastern University | Network and method for servicing a computation request |
US11962463B2 (en) | 2019-07-02 | 2024-04-16 | Northeastern University | Network and method for servicing a computation request |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20130198351A1 (en) | Flexible Caching in a Content Centric Network | |
Xie et al. | Enhancing cache robustness for content-centric networking | |
KR102301353B1 (en) | Method for transmitting packet of node and content owner in content centric network | |
US20090094200A1 (en) | Method for Admission-controlled Caching | |
Wang et al. | Decoupling malicious interests from pending interest table to mitigate interest flooding attacks | |
US9215205B1 (en) | Hardware accelerator for a domain name server cache | |
KR101978177B1 (en) | Method of caching contents by node and method of transmitting contents by contents provider in a content centric network | |
CN105376344B (en) | A kind of analytic method and system of recurrence name server relevant to source address | |
Salah et al. | Coordination supports security: A new defence mechanism against interest flooding in NDN | |
EP3258657B1 (en) | Ip route caching with two search stages on prefix length | |
Salah et al. | CoMon++: Preventing cache pollution in NDN efficiently and effectively | |
Wang et al. | Cooperative-filter: countering interest flooding attacks in named data networking | |
CN107222492A (en) | A kind of DNS anti-attack methods, equipment and system | |
Compagno et al. | Violating consumer anonymity: Geo-locating nodes in named data networking | |
CN109788319B (en) | Data caching method | |
CN106899692A (en) | A kind of content center network node data buffer replacing method and device | |
Lal et al. | A cache content replacement scheme for information centric network | |
WO2015185756A1 (en) | Method for managing packets in a network of information centric networking (icn) nodes | |
CN106657181B (en) | Data pushing method based on content-centric network | |
AbdAllah et al. | Detection and prevention of malicious requests in ICN routing and caching | |
Denko et al. | Cooperative caching with adaptive prefetching in mobile ad hoc networks | |
Widjaja | Towards a flexible resource management system for content centric networking | |
Feng et al. | Least popularly used: A cache replacement policy for information-centric networking | |
Yang et al. | PPNDN: Popularity-based caching for privacy preserving in named data networking | |
Antonopoulos et al. | Network driven cache behavior in wireless sensor networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WIDJAJA, INDRA;XIE, MANGJUN;SIGNING DATES FROM 20120125 TO 20120126;REEL/FRAME:027608/0824 |
|
AS | Assignment |
Owner name: ALCATEL LUCENT, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:029858/0206 Effective date: 20130221 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:030510/0627 Effective date: 20130130 |
|
AS | Assignment |
Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033949/0016 Effective date: 20140819 |
|
AS | Assignment |
Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE SPELLING OF INVENTOR NAME MENGJUN XIE PREVIOUSLY RECORDED ON REEL 027608 FRAME 0824. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:WIDJAJA, INDRA;XIE, MENGJUN;SIGNING DATES FROM 20120125 TO 20120126;REEL/FRAME:034007/0134 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |